NJ County and City Hit by Ryuk Ransomware Attacks What's Inside
Total Page:16
File Type:pdf, Size:1020Kb
“Useful Technology Ideas for Your Business” What’s Inside: NJ County and City Hit by Ryuk Ransomware NJ County and City Hit by Ryuk Attacks Ransomware Attacks On November 9 and November 12, the computer systems of ..........................…................Page 1 Union County and the city of Dover, respectively, were both targeted by a ransomware infection. Details in either case are still What our clients are limited at this time, however, the attacks affected the internal networks of both governments to some degree before service was saying .................................Page 1 restored. The public agencies were able to regulate the damage with external help from IT service firms. Creating a Sense of Shared Cybersecurity Union County and Dover, Morris County, NJ Cyberattacks The first attack occurred on a Saturday, so the Dover municipal ............................................Page 2 government was not aware of the infection until the following Tuesday – the same day Union County’s network was hit, though they were able to respond to the incident much more quickly Survey chance to win a gift as it happened on a weekday. Both experienced a slowdown in their internal email servers, card! ...................................Page 2 while the latter also saw some website assets affected. Statements from both governments claim that no data was lost and most services have been restored as of this writing. Shiny gadget of the month Hundreds of Cities Infected with Ransomware ............................................Page 3 These cyber incidents follow a rapidly growing trend of public institutions being targeted by ransomware attacks. Hospitals, police departments and now municipal and state agencies are increasingly victimized by malware infections that encrypt databases and demand a payment to States Impose Greater Data unlock those files. Baltimore, Philadelphia, and several cities throughout New Jersey are only a Privacy Standards few of the many that have been assailed by malware infections. ............................................Page 3 These developments have not gone unnoticed and have been addressed at multiple levels of government. However, despite the efforts by local and federal agencies, ransomware continues TRIVIA .................................Page 3 to affect cities, states and private businesses across the country. This is because hackers know what techniques to use against overextended networks like those of public institutions and Services we offer……...........Page 4 SMBs, including social engineering and exploiting popular applications like the Office 365 suite. Tips for staying safe this holiday season Continued on page 2... ............................................Page 4 What our clients are saying: Pee Jay's Fresh Fruit “SWK’s response time has been great. There have been many times we've submitted an email with an issue and received a call back within 5 minutes. Very impressive! Shay always goes above and beyond. Earlier this year we had an email issue with an outside vendor, and he got involved - even contacted the outside vendor himself - and made sure to stay on top of the situation. When I put it on the back burner, he still was working on it and even though it was not a quick fix, he helped resolve it! Our biggest benefit by working with SWK is that we have confidence that if any IT issues arise, they will be dealt with quickly. If it's not a quick fix, it will be thoroughly examined and diligently worked on until it's completed.” Anthony D'Agostino Pee Jay's Fresh Fruit Get More Free Tips, Tools, and Services on Our Website: www.swknetworkservices.com Page 2 NJ County and City Hit by Ryuk Ransomware AreTwo You STILL ways Using Outdated to Attacks WINTape Backups? a gift Continued from page 1… If your computer network and the data it holds got erasedcard! or corrupted because of a What is Ryuk and Why You Should Be Worried About It virus, hard drive crash, fire, flood or some Another worrying trend among many recent ransomware attacks – including the majority of reported otherIt only random, takes unforeseen a minute disaster, and howYOU incidents in NJ – is that the same type of malware was used in most cases: Ryuk. The profile of Ryuk confidentcould are be you our RIGHT next winner! NOW that makes it a huge concern, as researchers note that it is deployed almost exclusively for targeted attacks your business could be back up and with critical files encrypted and larger ransoms demanded. Additionally (or perhaps, appropriately), this type of ransomware can be employed through several different methods and channels, and can delete all running again FAST? evidence of its presence. Last Month’s If your answer to that is, “I don’t know,” This last factor reinforces the theory that many of the latest malware samples have something in common. or “I’mContest not sure,” you Winner: are taking a HUGE It could mean that cybercriminals are copying each other, though it could also mean that they are actively risk with yourCindy company’s Daley most important sharing data and methodologies or that it could even be the same group carrying out all of these attacks. asset—the data on your network. Just The nature of the Dark Web makes it difficult, though not impossible, to consistently track down culprits. imagineFriendly what would Planet happen Travel to your NJ is a Prime Cybercrime Target business if you lost your entire client Of the now eight reported ransomware attacks in NJ, Ryuk was used in three – along with the Dover and Pleasedatabase… complete our brief survey in Union County attacks, the Cherry Hill School District was also a victim of a breach by the same malware type. Besides these examples, all but the attack against Newark – which was hit by the similar SamSam order…Lost to all be accounting placed in documentation the running andto virus - were attributed to unknown actors. The reality is that many (if not most) departments and winhistory…Lost this month's all the gift work card files prize! you’ve businesses in New Jersey and nearby metropolitan areas do not disclose when they are hacked. spent YEARS developing…Lost the work Ryuk has largely replaced SamSam as the ransomware of choice, but given the similar tactics between 1.files What and documentation do you like youmost so desperatelyabout the two, the former’s rise was likely enabled by the lack of actionable information on the latter. This need to service your customers… leads to victims falling for the same scams as those before them, as the data, knowledge and experience our services? needed to spot infection vectors and respond to locked files is lacking. Can you even put a price tag on it? 2.Probably Tell us not about –yet so a manyspecific business Learn How to Defend Against Ransomware owners aren’t 100% certain that they could SWK Technologies has firsthand experience with helping clients deal with ransomware (see how we experiencebe back up and with running us thatafter a you disaster were and helped Continental Food and Beverage, distributors of Inca Kola, save their files). We can provide you with tools and expertise to help you combat this growing threat and prepare your business to defend your happyare purely with. hoping that their current tape network against malware infections. drive or backup is working and storing a usable copy of their data. Download our free Business Guide to Ransomware ebook to learn more about what to expect and you 3. What are the biggest benefits can begin protecting yourself against what’s out there. you’Tapeve received Drives Areor experienced The MOST sinceUnreliable, hiring us? Unsecured Way To Back Up Your Data Creating a Sense of Shared Cybersecurity 4. What can we improve? In cybersecurity, people are your weakest link and your best defense – you have probably heard us say this more than once. All tape drives fail; it’s only a matter of Just as your business cannot run without people, neither can you network security. Any cybersecurity plan is twofold, in “when,” not “if.” So if being able to get that you must prevent employees from exposing you to cyber risks while empowering them to detect and respond to Email Jon Stiles potential threats. back up and running again in the event of ([email protected])a data-erasing disaster is important, then with Creating and enforcing a security culture takes work, but is increasingly necessary. A majority of SMBs have been targeted you need to know about our <<Name Of by hackers, and as the world becomes more connected, so too will your business. Anyone who uses a computer, your responses smartphone or tablet accessible to your network will have a cybersecurity role, and thus bear responsibility for your Backup>>. OR network security. Fill out our online form: Here are a few steps that will help you establish a shared sense of cybersecurity in your business: <<Outline the benefits here: This fool- http://bit.ly/nwsnewsproof backup service does-survey more than just Data Integrity and Compliance keep a copy of your files—it provides Your first cybersecurity concern should always be data protection. Network breaches, credential leaks and the theft of before Dec 31st to get your name in critical and personal information can and will have serious consequences for your business. The most impactful will be the the“continuous hat. data protection” and enables monetary losses that can result from the breach of consumer trust and data security regulations, as well as expenses for near-instant disaster recovery because it resolving your security vulnerabilities. takes a snapshot of your entire network Data protection best practices range from basic solutions like password security education, to implementing multi-factor throughoutYou the could day, giving win you the a authentication and other services that add an extra layer of security for your network users.